- kernel-uek-4.1.12-124.32.3.2.el6uek (oel6-uek4)
- 4.1.12-124.81.2.el6uek
- 2024-01-29 11:32:22
- 2024-02-06 13:27:13
- K20240129_03
- CVE-2019-15219, CVSSv2 Score: 4.6
- Description:
USB: sisusbvga: fix oops in error path of sisusb_probe
- CVE: https://linux.oracle.com/cve/CVE-2019-15219.html
- Patch: 2.6.32/CVE-2019-15219.patch
- From: 2.6.39-400.317.1.el6uek
- CVE-2019-15807, CVSSv2 Score: 7.5
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15807.html
- Patch: 4.15.0/CVE-2019-15807-scsi-libsas-delete-sas-port-if-expander-discover-failed.patch
- From: 4.15.0-15807
- CVE-2019-16233, CVSSv2 Score: 7.5
- Description:
potential NULL dereference in qla2xx SCSI driver.
- CVE: https://linux.oracle.com/cve/CVE-2019-16233.html
- Patch: 4.1.12/cve-2019-16233-qla_os-does-not-check-alloc_workqueue.patch
- From: kernel-uek-4.1.12-124.35.1.el6uek
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
- CVE: https://access.redhat.com/security/cve/CVE-2019-19332
- Patch: 4.14.0/CVE-2019-19332.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-17666, CVSSv2 Score: 8.8
- Description:
rtlwifi: Fix potential overflow on P2P code
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-17666
- Patch: 3.16.0/cve-2019-17666-rtlwifi-fix-potential-overflow-on-P2P-code.patch
- From: 3.16.81-1
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
kvm: nVMX: fixed L2 guest possible tricking the L0 hypervisor to access sensitive L1 resources
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 4.1.12/CVE-2020-2732.patch
- From: 4.1.12-124.36.1.1
- CVE-2019-15291, CVSSv2 Score: 4.6
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15291
- Patch: 3.16.0/cve-2019-15291-media-b2c2-flexcop-usb-add-sanity-check.patch
- From: 3.16.81-1
- CVE-2019-14901, CVSSv2 Score: 9.8
- Description:
fix a heap overflow in mmwifiex_process_tdls_action_frame()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14901
- Patch: 4.4.0/CVE-2019-14901-mwifiex-Fix-heap-overflow-in-mmwifiex.patch
- From: kernel-4.4.0-171.200
- CVE-2019-18806, CVSSv2 Score: 5.5
- Description:
net: qlogic: Fix memory leak in ql_alloc_large_buffers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18806
- Patch: 4.9.0/CVE-2019-18806.patch
- From: 4.9.210-1
- CVE-2018-5953, CVSSv2 Score: 5.5
- Description:
printk: hash addresses printed with %p
- CVE: https://linux.oracle.com/cve/CVE-2018-5953.html
- Patch: 4.1.12/lib-vsprintf-printk-hash-addresses-printed-with.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2020-10942, CVSSv2 Score: 5.5
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://linux.oracle.com/cve/CVE-2020-10942.html
- Patch: 4.1.12/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 3.16.0/cve-2019-19527-usb-hid-avoid-opening-disconnected-device.patch
- From: 3.16.81-1
- CVE-2020-8649 CVE-2020-8647, CVSSv2 Score: 5.9
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8649.html
- Patch: 4.1.12/CVE-2020-8649.patch
- From: 4.1.12-124.38.4
- CVE-2019-14816, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14816
- Patch: 3.10.0/cve-2019-14816-mwifiex-fix-three-heap-overflow-327.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2020-11494, CVSSv2 Score: 4.4
- Description:
slcan: Don't transmit uninitialized stack data in padding
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11494
- Patch: 4.1.12/CVE-2020-11494.patch
- From: 4.1.12-124.38.2
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9383
- Patch: 4.15.0/CVE-2020-9383-floppy-check-FDC-index-for-errors-before-assigning-it.patch
- From: 4.15.0-97.98
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8648
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2020-8648-vt-selection-close-sel_buffer-race.patch
- From: 4.4.0-178.208
- CVE-2019-19056, CVSSv2 Score: 7.5
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19056
- Patch: 3.16.0/cve-2019-19056-mwifiex-pcie-fix-memory-leak.patch
- From: 3.16.81-1
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19532
- Patch: 4.1.12/CVE-2019-19532.patch
- From: 3.16.81-1
- CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: screening firmware event packet
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.1.12/CVE-2019-9503.patch
- From: 4.1.12-124.39.1
- CVE-2019-19523, CVSSv2 Score: 4.6
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19523
- Patch: 3.16.0/cve-2019-19523-adutux-fix-use-after-free-on-disconnect.patch
- From: 3.16.81-1
- CVE-2020-11609, CVSSv2 Score: 4.3
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11609
- Patch: 4.19.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.19.118-2
- CVE-2019-12819, CVSSv2 Score: 5.5
- Description:
fix use-after-free in drivers/net/phy/mdio_bus.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12819.html
- Patch: 4.15.0/CVE-2019-12819.patch
- From: 4.15.0-58.64
- CVE-2019-14896 CVE-2019-14897, CVSSv2 Score: 9.8
- Description:
libertas: Fix two buffer overflows at parsing bss descriptor
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 4.4.0/CVE-2019-14896-14897-libertas-Fix-two-buffer-overflows-at-.patch
- From: kernel-4.4.0-171.200
- CVE-2019-19528, CVSSv2 Score: 4.6
- Description:
USB: iowarrior: fix use-after-free on release
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19528
- Patch: 4.19.0/CVE-2019-19528-2.patch
- From: 4.19.98-1
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 3.16.0/cve-2019-19537-usb-core-fix-races-in-character-device-registration.patch
- From: 3.16.81-1
- CVE-2019-19057, CVSSv2 Score: 3.3
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19057
- Patch: 3.16.0/cve-2019-19057-mwifiex-pcie-fix-another-memory-leak.patch
- From: 3.16.81-1
- CVE-2018-18281, CVSSv2 Score: 4.6
- Description:
mremap: properly flush TLB before releasing the page
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18281
- Patch: 4.4.0/CVE-2018-18281.patch
- From: kernel-4.4.163
- CVE-2019-19524, CVSSv2 Score: 4.6
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19524
- Patch: 3.16.0/cve-2019-19524-ff-memless-kill-timer-in-destroy.patch
- From: 3.16.81-1
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11668
- Patch: 4.15.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- CVE-2019-20636, CVSSv2 Score: 6.7
- Description:
Input: add safety guards to input_set_keycode()
- CVE: https://access.redhat.com/security/cve/cve-2019-20636
- Patch: 4.1.12/CVE-2019-20636.patch
- From: 4.1.12-124.39.5
- CVE-2020-11608, CVSSv2 Score: 4.3
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11608
- Patch: 4.19.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: 4.19.118-2
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2019-19533, CVSSv2 Score: 2.4
- Description:
media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19533
- Patch: 3.16.0/cve-2019-19533-media-ttusb_dec-fix-info-leak.patch
- From: 3.16.81-1
- CVE-2019-19536, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19536
- Patch: 3.16.0/cve-2019-19536-peak_usb-fix-info-leaks.patch
- From: 3.16.81-1
- CVE-2017-16538, CVSSv2 Score: 4.6
- Description:
media: dvb-usb-v2: lmedm04: Improve logic checking of warm start
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16538
- Patch: 4.4.0/572851-media-dvb-usb-v2-lmedm04-Improve-logic-checking-of.patch
- From: kernel-4.4.0-120.144
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
ALSA: core: Fix card races between register and disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15214
- Patch: 3.16.0/cve-2019-15214-alsa-fix-card-races-between-init-and-disconnect.patch
- From: linux-3.16.72-1
- CVE-2019-19534, CVSSv2 Score: 2.4
- Description:
can: peak_usb: fix slab info leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19534
- Patch: 3.16.0/cve-2019-19534-can-peak_usb-fix-slab-info-leak.patch
- From: 3.16.81-1
- CVE-2019-19054, CVSSv2 Score: 4.7
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19054
- Patch: 4.14.0/cve-2019-19054-media-rc-prevent-memory-leak.patch
- From: 4.14.35-1902.304.6
- CVE-2020-14416, CVSSv2 Score: 4.2
- Description:
can, slip: Protect tty->disc_data in write_wakeup and close with RCU
- CVE: https://linux.oracle.com/cve/CVE-2029-14416.html
- Patch: 4.1.12/cve-2020-14416-can-protect-disc_data-and-close-with-RCU.patch
- From: 4.1.12-124.41.1
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://linux.oracle.com/cve/CVE-2020-12888.html
- Patch: 4.1.12/cve-2020-12888.patch
- From: 4.1.12-124.41.2
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://linux.oracle.com/cve/CVE-2020-12888.html
- Patch: 4.1.12/cve-2020-12888-kpatch-1.patch
- From: 4.1.12-124.41.2
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10732
- Patch: 4.1.12/cve-2020-10732-fs-binfmt_elf.c-allocate-initialized-memory-in-fill_.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19049, CVSSv2 Score: 6.4
- Description:
of: unittest: fix memory leak in unittest_data_add
- CVE: https://access.redhat.com/security/cve/CVE-2019-19049
- Patch: 4.1.12/cve-2019-19049-of-unittest-data-memory-leak.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19062, CVSSv2 Score: 7.5
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19062
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19062-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-4.4.0-173.203
- CVE-2019-20811, CVSSv2 Score: 5.5
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20811
- Patch: 4.9.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: 4.9.210-1+deb9u1
- CVE-2017-16644, CVSSv2 Score: 4.6
- Description:
hdpvr: Fix an error handling path in hdpvr_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2017-16644
- Patch: 4.1.12/cve-2017-16644-hdpvr-fix-an-error-handling-path.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19535, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19535.patch
- From: 4.9.210-1
- CVE-2016-10905, CVSSv2 Score: 7.8
- Description:
GFS2: don't set rgrp gl_object until it's inserted into rgrp tree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10905
- Patch: 4.1.12/CVE-2016-10905.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2016-10906, CVSSv2 Score: 7.0
- Description:
net: arc_emac: fix koops caused by sk_buff free
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10906
- Patch: 4.1.12/CVE-2016-10906.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2017-8924, CVSSv2 Score: 4.3
- Description:
USB: serial: io_ti: fix information leak in completion handler
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-8924
- Patch: 3.13.0/422388-USB-serial-io_ti-fix-information-leak-in-completio.patch
- From: kernel-3.13.0-124.173
- CVE-2017-8925, CVSSv2 Score: 5.5
- Description:
USB: serial: omninet: fix reference leaks at open
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-8925
- Patch: 3.13.0/422387-USB-serial-omninet-fix-reference-leaks-at-open.patch
- From: kernel-3.13.0-124.173
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
pipe: add pipe_buf_get() helper
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-pipe-add-pipe_buf_get-helper.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: add 'try_get_page()' helper function
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-add-try_get_page-helper-function.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
fs: prevent page refcount overflow in pipe_buf_get
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-fs-prevent-page-refcount-overflow-in-pipe_buf_get-uek.patch
- From: 4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: make page ref count overflow check tighter and more explicit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-make-page-ref-count-overflow-check-tighter-and-more-explicit.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm, gup: ensure real head page is ref-counted when using hugepages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-gup-ensure-real-head-page-is-ref-counted-when-using-hugepages.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-mm-prevent-get_user_pages-from-overflowing-page-refcount.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-6.patch
- From: kernel-4.4.0-165.193
- CVE-2017-16528, CVSSv2 Score: 6.6
- Description:
ALSA: seq: Cancel pending autoload work at unbinding device
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16528
- Patch: 4.4.0/571813-ALSA-seq-Cancel-pending-autoload-work-at-unbinding.patch
- From: kernel-4.4.0-117.141
- CVE-2018-16884, CVSSv2 Score: 6.7
- Description:
sunrpc: use-after-free in svc_process_common
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16884
- Patch: 4.4.0/CVE-2018-16884.patch
- From: kernel-4.4.171
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-20856, CVSSv2 Score: 5.9
- Description:
use-after-free
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20856
- Patch: 4.4.0/CVE-2018-20856.patch
- From: kernel-4.4.0-161.189
- CVE-2019-3846, CVSSv2 Score: 8.8
- Description:
mwifiex: Abort at too short BSS descriptor element
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3846.html
- Patch: 4.4.0/CVE-2019-3846-mwifiex-fix-possible-buffer-overflows-at-parsing-bss-descriptor.patch
- From: kernel-4.4.0-159.187
- CVE-2019-3874, CVSSv2 Score: 6.5
- Description:
sctp: implement memory accounting on tx path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3874
- Patch: 4.4.0/CVE-2019-3874-sctp-implement-memory-accounting-on-tx-path-116.140.patch
- From: 4.4.0-147.173
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.4.0/cfg80211-mac80211-make-ieee80211_send_layer2_update-a-public-function.patch
- From: 4.4.0-174.204
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 3.8.13/CVE-2019-5108-mac80211-Do-not-send-Layer-2-Update-frame-before-authorization--alt-3.8.patch
- From: 4.9.212-36.el7
- CVE-2019-6974, CVSSv2 Score: 6.8
- Description:
kvm: fix kvm_ioctl_create_device() reference counting
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 4.4.0/CVE-2019-6974.patch
- From: kernel-4.4.176
- CVE-2019-7221, CVSSv2 Score: 7.5
- Description:
KVM: nVMX: unconditionally cancel preemption timer in free_nested
- CVE: https://access.redhat.com/security/cve/cve-2019-7221
- Patch: 4.1.12/CVE-2019-7221.patch
- From: kernel-4.4.175
- CVE-2019-7222, CVSSv2 Score: 2.8
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://access.redhat.com/security/cve/cve-2019-7222
- Patch: 4.4.0/CVE-2019-7222-112.patch
- From: kernel-4.4.175
- CVE-2020-10720, CVSSv2 Score: 5.3
- Description:
net-gro: fix use-after-free read in napi_gro_frags()
- CVE: https://access.redhat.com/security/cve/cve-2020-10720
- Patch: 4.18.0/cve-2020-10720-net-gro-fix-use-after-free.patch
- From: kernel-4.18.0-147.el8
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: Print 'sclass' as string when unrecognized netlink message occurs (CVE-2020-10751 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10751
- Patch: 3.16.0/CVE-2020-10751-selinux-print-sclass-as-string-when-unrecognized-net.patch
- From: 3.16.84-1
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc - fix parsing key with misaligned rta_len
- CVE: https://linux.oracle.com/cve/CVE-2020-10769.html
- Patch: 4.14.0/cve-2020-10769-crypto-authenc-fix-parsing-key-with-misaligned-rta_len.patch
- From: 4.14.35-1902.306.2
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2019-14331, CVSSv2 Score: 6.6
- Description:
vgacon: Fix for missing check in scrollback handling
- CVE: vgacon: Fix for missing check in scrollback handling
- Patch: 3.8.13/CVE-2020-14331-vgacon-Fix-for-missing-check-in-scrollback-handlin.patch
- From: 3.8.13-118.49.1
- CVE-2019-16746, CVSSv2 Score: 9.8
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.9.0/CVE-2019-16746.patch
- From: 4.4.0-168.197
- CVE-2019-17075, CVSSv2 Score: 7.5
- Description:
fixed possible DoS in drivers/infiniband/hw/cxgb4/mem.c via directly calling dma_map_single() from a stack variable
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17075.html
- Patch: 4.4.0/CVE-2019-17075.patch
- From: kernel-4.4.0-170.199
- CVE-2019-18885, CVSSv2 Score: 5.5
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: 4.1.12/CVE-2019-18885.patch
- From: 5.0.0.1029.33
- CVE-2019-19052, CVSSv2 Score: 7.5
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19052
- Patch: 3.16.0/cve-2019-19052-can-gs_usb-prevent-memory-leak.patch
- From: 3.16.81-1
- CVE-2019-19073, CVSSv2 Score: 4.0
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19073
- Patch: 4.4.0/CVE-2019-19073-ath9k_htc-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix dereference after null check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19768
- Patch: 4.1.12/CVE-2019-19768.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2019-19965, CVSSv2 Score: 4.7
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19965
- Patch: 4.4.0/CVE-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconnected.patch
- From: 4.4.0-174.204
- CVE-2019-20054, CVSSv2 Score: 5.5
- Description:
mwifiex: Fix mem leak in mwifiex_tm_cmd
- CVE: https://linux.oracle.com/cve/CVE-2019-20054.html
- Patch: 4.15.0/cve-2019-20054-sysctl-fix-NULL-ptr-dereference.patch
- From: 4.14.35-1902.10.5
- CVE-2019-20096, CVSSv2 Score: 5.5
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-20096
- Patch: 4.4.0/CVE-2019-20096-dccp-Fix-memleak-in__feat_register_sp.patch
- From: 4.4.0-174.204
- CVE-2019-20812, CVSSv2 Score: 5.5
- Description:
af_packet: set defaule value for tmo
- CVE: af_packet: set defaule value for tmo
- Patch: 3.8.13/CVE-2020-20812-af_packet-set-defaule-value-for-tmo.patch
- From: 3.8.13-118.49.1
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.1.12/CVE-2020-1749.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.1.12/CVE-2020-1749-kpatch.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25212
- Patch: 4.4.0/CVE-2020-25212-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: 4.4.0-190.220
- CVE-2020-25284, CVSSv2 Score: 5.5
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.1.12/CVE-2020-25284.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-25285, CVSSv2 Score: 7.0
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.1.12/CVE-2020-25285.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2019-15218, CVSSv2 Score: 4.6
- Description:
media: usb: siano: Fix general protection fault in smsusb
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15218
- Patch: 4.9.0/cve-2019-15218-media-usb-fix-general-protection-fault.patch
- From: kernel-4.9.75-29.el7
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.4.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.4.0-166.195
- CVE-2019-15927, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15927
- Patch: 4.9.0/CVE-2019-15927-ALSA-usb-audio-Avoid-access-before-bLength-check-in-build_audio_procunit.patch
- From: linux-4.9.189-3
- CVE-2019-19530, CVSSv2 Score: 5.7
- Description:
usb: cdc-acm: make sure a refcount is taken early enough
- CVE: https://access.redhat.com/security/cve/CVE-2019-19530
- Patch: 4.1.12/CVE-2019-19530.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-25643, CVSSv2 Score: 7.2
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2016-7913, CVSSv2 Score: 9.3
- Description:
xc2028: avoid use after free
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2016-7913.html
- Patch: 4.4.0/569505-xc2028-avoid-use-after-free.patch
- From: kernel-4.4.0-79.100
- CVE-2020-26541, CVSSv2 Score: 6.5
- Description:
kexec, KEYS: kexec signature blacklist verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-26541
- Patch: 4.1.12/CVE-2020-25641-uek4.patch
- From: 4.1.12-124.44.4
- CVE-2020-25211, CVSSv2 Score: 7.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-uek-4.14.35-2025.402.2.1.el7uek
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-kpatch.patch
- From: kernel-uek-4.14.35-2025.401.4.el7uek
- N/A, CVSSv2 Score: N/A
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE: N/A
- Patch: 4.14.0/net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: 4.14.162
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-update-the-net-random-state-on-interrupt-and-activity.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random: fix circular include dependency on arm64 after addition of percpu.h
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random-fix-circular-include-dependency-on-arm64-after-addition-of-percpu-h.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: remove net_rand_state from the latent entropy gcc plugin
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-remove-net_rand_state-from-the-latent-entropy-gcc-plugin.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: move the pseudo-random 32-bit definitions to prandom.h
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-move-the-pseudo-random-32-bit-definitions-to-prandom-h.patch
- From: 4.1.12-124.45.6
- CVE-2019-14895, CVSSv2 Score: 9.8
- Description:
mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14895
- Patch: 4.1.12/cve-2019-14895-mwifiex-fix-possible-heap-overflow-in.patch
- From: 4.1.12-124.46.3
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: cope with NULL catmap
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 3.10.0/CVE-2020-10711.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
drivers: usb: core: Don't disable irqs in usb_sg_wait() during URB submit. (CVE-2020-12464 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12464
- Patch: 3.16.0/CVE-2020-12464-drivers-usb-core-don-t-disable-irqs-in-usb_sg_wait-d.patch
- From: 3.16.84-1
- CVE-2020-12652, CVSSv2 Score: 4.1
- Description:
scsi: mptfusion: Fix double fetch bug in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12652
- Patch: 4.9.0/cve-2020-12652-scsi-mpfusion-fix-double-fetch-bug-30.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://access.redhat.com/security/cve/CVE-2019-19447
- Patch: 3.10.0/CVE-2019-19447-0197-fs-ext4-work-around-deleting-a-file-with-i_nlink-O-s.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19037, CVSSv2 Score: 5.5
- Description:
ext4: fix ext4_empty_dir() for directories with holes
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19037
- Patch: 4.1.12/cve-2019-19037-ext4_mkempty_dir-fix.patch
- From: 4.1.12-124.46.3
- CVE-2020-14305, CVSSv2 Score: 8.1
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-25668, CVSSv2 Score: 7.0
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25668
- Patch: 4.19.0/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28974, CVSSv2 Score: 4.6
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28974
- Patch: 4.19.0/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.4.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://www.saddns.net/
- Patch: 4.14.0/icmp-randomize-the-global-rate-limiter.patch
- From: v4.14.203
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Don't free p->numa_faults with concurrent readers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20934
- Patch: 4.1.12/cve-2019-20934-dont-free-pnuma_faults-with-concurrent-readers.patch
- From: 4.1.12-124.46.3
- CVE-2020-15436, CVSSv2 Score: 5.3
- Description:
block: Fix use-after-free in blkdev_get()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15436
- Patch: 4.1.12/cve-2020-15436-fix-use-after-free-in-blkdev_get.patch
- From: 4.1.12-124.46.3
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
target: fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/CVE-2020-28374
- Patch: 4.1.12/CVE-2020-28374-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.1.12-124.46.4.1.el6uek
- CVE-2020-29569, CVSSv2 Score: 8.8
- Description:
set ring->xenblkd to NULL explicitly
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-29569
- Patch: 4.14.0/cve-2020-29569-set-xenblkd-to-NULL.patch
- From: kernel-uek-4.14.35-2025.403.3
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 3.16.0/CVE-2020-12653-mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 3.16.84-1
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: core: Use correct spinlock flavor in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-core-Use-correct-spinlock-flavor-in-tiocspgrp.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-Fix-session-locking.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-36158, CVSSv2 Score: 6.7
- Description:
mwifiex: Fix possible buffer overflows in
- CVE: https://access.redhat.com/security/cve/CVE-2020-36158
- Patch: 4.1.12/CVE-2020-36158-mwifiex-Fix-possible-buffer-overflows-in.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.1.12/CVE-2020-27786-ALSA-rawmidi-Fix-racy-buffer-resize-under-concurrent-accesses.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.1.12/CVE-2020-27786-kpatch.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: debian10/4.19.171-2/CVE-2020-29568-xsa349-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.1.12/CVE-2020-29568-xsa349-handle-xenwatch-thread-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533083-Xen-x86-don-t-bail-early-from-clear_foreign_p2m_ma.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533084-Xen-x86-also-check-kernel-mapping-in-set_foreign_p.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533085-Xen-gntdev-correct-dev_bus_addr-handling-in-gntdev.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533086-Xen-gntdev-correct-error-checking-in-gntdev_map_gr.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533087-xen-blkback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533088-xen-netback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533089-xen-scsiback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.1.12/533090-xen-blkback-fix-error-handling-in-xen_blkbk_map.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2020-0431, CVSSv2 Score: 6.7
- Description:
HID: hid-input: clear unmapped usages.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0431
- Patch: 4.15.0/CVE-2020-0431-HID-hid-input-clear-unmapped-usages.patch
- From: kernel-4.15.0-91.88
- CVE-2021-27363, CVSSv2 Score: 3.6
- Description:
scsi: iscsi: Restrict sessions and handles to admin
- CVE: https://access.redhat.com/security/cve/CVE-2021-27363
- Patch: 4.1.12/CVE-2021-27363-scsi-iscsi-Restrict-sessions-and-handles-to-admin.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/CVE-2021-27364
- Patch: 4.1.12/CVE-2021-27364-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.1.12/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.1.12/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2017-7472, CVSSv2 Score: 5.5
- Description:
[PATCH] KEYS: fix keyctl_set_reqkey_keyring() to not leak thread
- CVE: https://linux.oracle.com/cve/CVE-2017-7472.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2017-7472-patch-keys-fix-keyctl-set-reqkey-keyring-to-not-leak-thread.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2017-18270, CVSSv2 Score: 7.1
- Description:
[PATCH] KEYS: prevent creating a different user's keyrings
- CVE: https://linux.oracle.com/cve/CVE-2017-18270.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2017-18270-patch-keys-prevent-creating-a-different-user-s-keyrings.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2017-16537, CVSSv2 Score: 6.6
- Description:
media: imon: Fix null-ptr-deref in imon_probe
- CVE: https://linux.oracle.com/cve/CVE-2017-16537.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2017-16537-media-imon-fix-null-ptr-deref-in-imon-probe.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2018-9422, CVSSv2 Score: 7.8
- Description:
futex: Remove unnecessary warning from get_futex_key
- CVE: https://linux.oracle.com/cve/CVE-2018-9422.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2018-9422-futex-remove-requirement-for-lock-page-in-get-futex-key.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://linux.oracle.com/cve/CVE-2020-12770.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-12770-scsi-sg-add-sg-remove-request-in-sg-write.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-14390, CVSSv2 Score: 5.6
- Description:
fbcon: remove soft scrollback code
- CVE: https://linux.oracle.com/cve/CVE-2020-14390.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-14390-fbcon-remove-soft-scrollback-code.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-14390, CVSSv2 Score: 5.6
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2020-14390.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-14390-kpatch.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://linux.oracle.com/cve/CVE-2021-30002.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-30002-media-v4l-ioctl-fix-memory-leak-in-video-usercopy.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://linux.oracle.com/cve/CVE-2021-43976.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-43976-mwifiex-fix-skb-over-panic-in-mwifiex-usb-recv.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://linux.oracle.com/cve/CVE-2021-45486.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-45486-inet-use-bigger-hash-table-for-ip-id-generation.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2021-45486.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-45486-inet-use-bigger-hash-table-for-ip-id-generation-kpatch.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-0850, CVSSv2 Score: 7.1
- Description:
ext4: fix kernel infoleak via ext4_extent_header
- CVE: https://linux.oracle.com/cve/CVE-2022-0850.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-0850-ext4-fix-kernel-infoleak-via-ext4-extent-header.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
[PATCH] af_key: Do not call xfrm_probe_algs in parallel (modified for old kernels)
- CVE: https://linux.oracle.com/cve/CVE-2022-3028.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-3028-1659-patch-af-key-do-not-call-xfrm-probe-algs-in-parallel.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
CVE-2022-2964 dependancy
- CVE: https://linux.oracle.com/cve/CVE-2022-2964.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2964-net-usb-ax88179-178a-fix-packet-alignment-padding.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://linux.oracle.com/cve/CVE-2022-2964.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2964-net-usb-ax88179-178a-fix-out-of-bounds-accesses-in-rx-fixup.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-36879, CVSSv2 Score: 5.5
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://linux.oracle.com/cve/CVE-2022-36879.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-36879-xfrm-xfrm-policy-fix-a-possible-double-xfrm-pols-put-in.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag
- CVE: https://ubuntu.com/security/CVE-2022-2503
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2503-dm-verity-set-DM_TARGET_IMMUTABLE-feature-flag.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-2503
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2503-kpatch.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2020-0444, CVSSv2 Score: 7.8
- Description:
audit: fix error handling in audit_data_to_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2020-0444
- Patch: 4.1.12/CVE-2020-0444-audit-fix-error-handling-in-audit_data_to_entry.patch
- From: 4.1.12-124.49.3.1.el6uek
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
epoll: Keep a reference on files added to the check list
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0001-epoll-Keep-a-reference-on-files-added-to-the-check-193.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
do_epoll_ctl(): clean the failure exits up a bit
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0002-do_epoll_ctl-clean-the-failure-exits-up-a-bit-193.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0465, CVSSv2 Score: 6.6
- Description:
HID: core: Sanitize event code and type when mapping input
- CVE: https://access.redhat.com/security/cve/CVE-2020-0465
- Patch: 4.1.12/CVE-2020-0465-HID-core-Sanitize-event-code-and-type-when-mapping-input.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2020-35508, CVSSv2 Score: 4.5
- Description:
fork: fix copy_process(CLONE_PARENT) race with the exiting
- CVE: https://access.redhat.com/security/cve/CVE-2020-35508
- Patch: 4.1.12/CVE-2020-35508-fork-fix-copy_processCLONE_PARENT-race-with-the-exiting.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-Xen-gnttab-handle-p2m-update-errors-on-a-per-slot-basis.patch
- From: 4.14.225-121.357.amzn1
- CVE-2019-19061, CVSSv2 Score: 5.9
- Description:
floppy: fix lock_fdc() signal handling
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-20261-floppy-fix-lock_fdc-signal-handling-164.192.patch
- From: 4.4.0-208.240
- CVE-2021-20219, CVSSv2 Score: 5.5
- Description:
n_tty: Fix stall at n_tty_receive_char_special().
- CVE: https://access.redhat.com/security/cve/CVE-2021-20219
- Patch: 4.1.12/CVE-2021-20219-n_tty-Fix-stall-at-n_tty_receive_char_special.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old root
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.1.12/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: make xt_replace_table wait until old
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-make-xt_replace_table-wait-until-old.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28688, CVSSv2 Score: 6.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: 4.14.0/CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-31916
- Patch: debian9/4.9.272-1/0030-CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.9.272-1
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2020-36386, CVSSv2 Score: 7.1
- Description:
Bluetooth: Fix slab-out-of-bounds read in
- CVE: https://access.redhat.com/security/cve/CVE-2020-36386
- Patch: 4.1.12/CVE-2020-36386-Bluetooth-Fix-slab-out-of-bounds-read-in.patch
- From: 4.1.12-124.52.4.el7uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Prevent-freeing-event-subscriptions-while.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Prevent-freeing-event-subscriptions-while-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Add subscription to list before calling
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Add-subscription-to-list-before-calling.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9456, CVSSv2 Score:
- Description:
Omitting for now: Android Pixel C USB monitor driver
- CVE:
- Patch: skipped/CVE-2019-9456.patch
- From:
- CVE-2020-0305, CVSSv2 Score: 6.4
- Description:
kobject: Export kobject_get_unless_zero()
- CVE: https://access.redhat.com/security/cve/CVE-2020-0305
- Patch: 4.1.12/CVE-2020-0305-kobject-Export-kobject_get_unless_zero.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0305, CVSSv2 Score: 6.4
- Description:
[fs] chardev: Avoid potential use-after-free in 'chrdev_open()'
- CVE: https://access.redhat.com/security/cve/cve-2020-0305
- Patch: 4.18.0/CVE-2020-0305-18273-fs-chardev-Avoid-potential-use-after-free-in-chrdev.patch
- From: 4.18.0-240.el8
- CVE-2020-27068, CVSSv2 Score: 4.4
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.15.0/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE.patch
- From: kernel-4.15.0-99.100
- CVE-2020-27068, CVSSv2 Score: 4.4
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.15.0/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE-kpatch.patch
- From: kernel-4.15.0-99.100
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: 4.1.12/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From: kernel-5.8.0-59.66
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: Correctly return -EBADF from pppol2tp_getname.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-Correctly-return-EBADF-from-pppol2tp_getname.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
net: l2tp: Make l2tp_ip6 namespace aware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-net-l2tp-Make-l2tp_ip6-namespace-aware.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race in l2tp_recv_common()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-in-l2tp_recv_common.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: ensure session can't get removed during
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-ensure-session-can-t-get-removed-during.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix duplicate session creation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-duplicate-session-creation.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: Refactor the codes with existing macros instead of literal number
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-Refactor-the-codes-with-existing-macros-instead-of.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: ensure sessions are freed after their PPPOL2TP socket
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-ensure-sessions-are-freed-after-their-PPPOL2TP-socket.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-between-l2tp_session_delete-and.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall() (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-between-l2tp_session_delete-and-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-28097, CVSSv2 Score: 5.9
- Description:
vgacon: remove software scrollback support (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-28097
- Patch: 4.1.12/CVE-2020-28097-vgacon-remove-software-scrollback-support-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.1.12/CVE-2020-14304-net-mlx4_en-ethtool-Remove-unsupported-SFP-EEPROM-high.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4: Fix EEPROM dump support
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.1.12/CVE-2020-14304-net-mlx4-Fix-EEPROM-dump-support.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 4.1.12/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://access.redhat.com/security/cve/cve-2021-33909
- Patch: 4.1.12/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 3.16.7/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write-39.patch
- From: v5.12
- CVE-2019-19448, CVSSv2 Score: 7.8
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 3.10.0/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2020-12114, CVSSv2 Score: 4.7
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12114
- Patch: 4.9.0/cve-2020-12114-fs-namespace-fix-mountpoint-ref-counter-race.patch
- From: 4.9.210-1+deb9u1
- CVE-2021-0512, CVSSv2 Score: 7.8
- Description:
HID: make arrays usage and value to be the same
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0512
- Patch: debian9/4.9.272-1/CVE-2021-0512-hid-make-arrays-usage-and-value-to-be-the-same.patch
- From: 4.9.272-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate from_addr_param return
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.1.12/CVE-2021-3655-sctp-validate-from_addr_param-return.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-bionic/4.15.0-156.163/0004-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.15.0-156.163
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 4.1.12/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-its.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2021-3715, CVSSv2 Score: 7.8
- Description:
net_sched: cls_route: remove the right filter from hashtable
- CVE: https://access.redhat.com/security/cve/CVE-2021-3715
- Patch: 3.10.0/CVE-2021-3715-net-sched-cls-route-remove-the-right-filter-from-hashtable.patch
- From: 3.10.0-1160.42.2.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost-net: set packet weight of tx polling to 2 * vq size
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0001-vhost-net-set-packet-weight-of-tx-polling-to-2-vq-si-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: use packet weight for rx handler, too
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-use-packet-weight-for-rx-handler-too.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-introduce-vhost_exceeds_weight.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost-introduce-vhost_exceeds_weight.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: fix possible infinite loop
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-fix-possible-infinite-loop.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost: introduce vhost_exceeds_weight() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 4.15.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-4.15.0-151.157
- CVE-2020-24586, CVSSv2 Score: 4.3
- Description:
mac80211: add fragment cache to sta_info (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-24586
- Patch: 4.1.12/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24586-CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24586-CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: check defrag PN against current frame
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-check-defrag-PN-against-current-frame.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: extend protection against mixed key and fragment
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3901, CVSSv2 Score: 1.9
- Description:
perf/core: Fix perf_event_open() vs. execve() race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3901
- Patch: 4.1.12/CVE-2019-3901-perf-core-Fix-perf_event_open-vs.-execve-race.patch
- From: v4.6
- CVE-2019-19074, CVSSv2 Score: 7.5
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19074
- Patch: 4.4.0/CVE-2019-19074-ath9k-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2019-19063, CVSSv2 Score: 7.5
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19063
- Patch: 3.8.13/CVE-2019-19063-alt-3.8.patch
- From: 4.9.212-36.el7
- CVE-2018-9517, CVSSv2 Score: 4.7
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://access.redhat.com/security/cve/CVE-2018-9517
- Patch: 4.1.12/CVE-2018-9517-l2tp-pass-tunnel-pointer-to-session_create.patch
- From: 4.1.12-124.56.1.el7uek
- CVE-2017-18216, CVSSv2 Score: 5.5
- Description:
ocfs2: subsystem.su_mutex is required while accessing the
- CVE: https://access.redhat.com/security/cve/CVE-2017-18216
- Patch: 4.1.12/CVE-2017-18216-ocfs2-subsystem-su_mutex-is-required-while-accessing-the.patch
- From: 4.1.12-124.56.1.el7uek
- CVE-2020-12771, CVSSv2 Score: 5.1
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2018-1000026, CVSSv2 Score: 5.8
- Description:
bnx2x: disable GSO where gso_size is too big for hardware
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000026
- Patch: 4.4.0/572546-bnx2x-disable-GSO-where-gso_size-is-too-big-for-ha.patch
- From: kernel-4.4.0-117.141
- CVE-2018-1000026, CVSSv2 Score: 5.8
- Description:
net: create skb_gso_validate_mac_len()
- CVE: https://access.redhat.com/security/cve/CVE-2018-1000026
- Patch: 4.1.12/CVE-2018-1000026-net-create-skb_gso_validate_mac_len.patch
- From: 4.1.12-124.57.1
- CVE-2019-19816 CVE-2019-19813, CVSSv2 Score: 7.8
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19816
- Patch: ubuntu-xenial/4.4.0-201.233/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: kernel-4.4.0-20kernel-4.4.0-201.233
- CVE-2019-19813, CVSSv2 Score: 5.5
- Description:
btrfs: fix return value mixup in btrfs_get_extent
- CVE: https://access.redhat.com/security/cve/CVE-2019-19813
- Patch: 4.1.12/CVE-2019-19813-btrfs-fix-return-value-mixup-in-btrfs_get_extent.patch
- From: 4.1.12-124.57.1
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.9.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.9.272-1
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://access.redhat.com/security/cve/CVE-2021-3732
- Patch: 4.1.12/CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allowed.patch
- From: kernel-uek-4.1.12-124.58.2
- CVE-2021-1048, CVSSv2 Score: 7.8
- Description:
fix regression in "epoll: Keep a reference on files added to the
- CVE: https://access.redhat.com/security/cve/CVE-2021-1048
- Patch: 4.1.12/CVE-2021-1048-fix-regression-in-epoll-Keep-a-reference-on-files-added-to-the.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.1.12/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.1.12/CVE-2021-0920-kpatch.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.1.12/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: Add bt_dev logging macros
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-Add-bt_dev-logging-macros.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: use constant time memory comparison for secret
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-use-constant-time-memory-comparison-for-secret.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-3753, CVSSv2 Score: 5.9
- Description:
vt_kdsetmode: extend console locking (CVE-2021-3753)
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: 4.14.0/CVE-2021-3753.patch
- From: 4.14.243-185.433
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://access.redhat.com/security/cve/CVE-2021-20231
- Patch: 4.14.0/CVE-2021-20321-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 4.14.252-195.483.amzn2
- CVE-2022-0330, CVSSv2 Score: 7.4
- Description:
drm/i915: Reduce locking in execlist command submission
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Reduce-locking-in-execlist-command-submission.patch
- From: 4.1.12-124.61.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.1.12-124.61.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: n/a
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: 4.14.268-205.500.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.1.12/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.1.12-124.61.2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.1.12/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.1.12-124.61.2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
route: also update fnhe_genid when updating a route cache
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 4.1.12/CVE-2021-20322-route-also-update-fnhe_genid-when-updating-a-route-cache.patch
- From: 4.1.12-124.61.2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 4.1.12/CVE-2021-20322-ipv4-make-exception-cache-less-predictible.patch
- From: 4.1.12-124.61.2
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 4.1.12/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 4.1.12-124.61.2
- CVE-2022-26966, CVSSv2 Score: 4.6
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 4.1.12/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 4.1.12-124.61.2
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/CVE-2021-3573
- Patch: 4.9.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-object.patch
- From: 4.9.272-1
- CVE-2021-4002, CVSSv2 Score: 5.1
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.1.12/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.1.12-124.62.3
- CVE-2021-45095, CVSSv2 Score: 5.5
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-45095
- Patch: 4.9.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: 4.9.303-1
- CVE-2021-4157, CVSSv2 Score: 5.9
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://access.redhat.com/security/cve/CVE-2021-4157
- Patch: 4.1.12/CVE-2021-4157-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nfs_fh.patch
- From: 4.1.12-124.62.3
- CVE-2021-4149, CVSSv2 Score: 4.7
- Description:
btrfs: unlock newly allocated extent buffer after error
- CVE: https://access.redhat.com/security/cve/CVE-2021-4149
- Patch: 4.1.12/CVE-2021-4149-btrfs-unlock-newly-allocated-extent-buffer-after-error.patch
- From: 4.1.12-124.62.3
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.1.12/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.1.12-124.62.3
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.1.12/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.1.12-124.62.3
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 3.10.0/CVE-2022-1016-lt-1062.patch
- From: >kernel-3.10.0-1160.62.1.el7
- CVE-2021-45868, CVSSv2 Score: 5.1
- Description:
quota: check block number when reading the block in quota
- CVE: https://access.redhat.com/security/cve/CVE-2021-45868
- Patch: 4.1.12/CVE-2021-45868-quota-check-block-number-when-reading-the-block-in-quota.patch
- From: 4.1.12-124.62.3
- CVE-2021-45868, CVSSv2 Score: 5.1
- Description:
quota: correct error number in free_dqentry()
- CVE: https://access.redhat.com/security/cve/CVE-2021-45868
- Patch: 4.1.12/CVE-2021-45868-quota-correct-error-number-in-free_dqentry.patch
- From: 4.1.12-124.62.3
- CVE-2021-4203, CVSSv2 Score: 5.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses
- CVE: https://access.redhat.com/security/cve/CVE-2021-4203
- Patch: 4.1.12/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses.patch
- From: 4.1.12-124.62.3
- CVE-2021-4203, CVSSv2 Score: n/a
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (adaptation)
- CVE: n/a
- Patch: 4.1.12/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses-kpatch.patch
- From: 4.1.12-124.62.3
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-28388, CVSSv2 Score: 7.8
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28388
- Patch: ubuntu-bionic/4.15.0-188.199/0001-CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfre.patch
- From: 4.15.0-188.199
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.4.0-229.263
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpaptch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.1.12/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.1.12-124.65.1
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 3.10.0/CVE-2022-32250-nf_tables-disallow-non-stateful-expression-in-sets-earlier.patch
- From: 3.10.0-1160.71.1
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/0009-CVE-2022-33981-floppy-disable-FDRAWCMD-by-default.patch
- From: 5.4.0-122.138
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-33981-kpatch.patch
- From: 5.4.0-122.138
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2019-9213, CVSSv2 Score: 5.5
- Description:
mm: enforce min addr even if capable() in expand_downwards()
- CVE: https://linux.oracle.com/cve/CVE-2019-9213.html
- Patch: 4.1.12/CVE-2019-9213-mm-enforce-min-addr-even-if-capable-in-expand_downwa.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ip: constify ip_build_and_send_pkt() socket argument
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-1-ip-constify-ip_build_and_send_pkt-socket-argument.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
inet: constify ip_dont_fragment() arguments
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-2-inet-constify-ip_dont_fragment-arguments.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: Cache net in ip_build_and_send_pkt and ip_queue_xmit
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-4-ipv4-Cache-net-in-ip_build_and_send_pkt-and-ip_queue.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-5-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
- CVE: https://linux.oracle.com/cve/CVE-2020-36557.html
- Patch: 4.1.12/CVE-2020-36557-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtua.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2020-36557.html
- Patch: 4.1.12/CVE-2020-36557-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtua-kpatch.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
VT_RESIZEX: get rid of field-by-field copyin
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-VT_RESIZEX-get-rid-of-field-by-field-copyin.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix race in VT_RESIZEX
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-vt-vt_ioctl-fix-race-in-VT_RESIZEX.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-1011, CVSSv2 Score: 7.8
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1011
- Patch: 4.9.0/CVE-2022-1011-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: 4.9.320
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.9.0/CVE-2022-1011-fuse-fix-pipe-buffer-lifetime-for-direct_io-kpatch.patch
- From: 4.9.320
- CVE-2021-33656, CVSSv2 Score: 7.8
- Description:
vt: drop old FONT ioctls
- CVE: https://linux.oracle.com/cve/CVE-2021-33656.html
- Patch: 4.1.12/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: igmp: guard against silly MTU values
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-3-ipv4-igmp-guard-against-silly-MTU-values-1.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2022-43750, CVSSv2 Score: 7.8
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: keep backlog updated with qlen
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0005-sch_sfb-keep-backlog-updated-with-qlen.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to child
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0010-sch_sfb-Don-t-assume-the-skb-is-still-around-after-e.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0020-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-2663
- Patch: 4.14.0/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 4.14.293
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
- Patch: 4.14.0/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: 4.14.296-222.539
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
- Patch: 4.14.0/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.19.12
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: oel7-uek4/4.1.12-124.69.5.1.el7uek/CVE-2022-4378.patch
- From: 4.1.12-124.69.5.1.el7uek
- CVE-2022-3629, CVSSv2 Score: 3.3
- Description:
vsock: Fix memory leak in vsock_connect()
- CVE: https://linux.oracle.com/cve/CVE-2022-3629.html
- Patch: 4.1.12/CVE-2022-3629-vsock-fix-memory-leak-in-vsock_connect.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Tighten matching on DCC message
- CVE: https://access.redhat.com/security/cve/CVE-2022-2663
- Patch: 4.19.0/CVE-2022-2663-netfilter-nf_conntrack_irc-tighten-matching-on-DCC-message.patch
- From: 4.19.260-1
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-3565.html
- Patch: 4.1.12/CVE-2022-3565-kpatch.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
- Patch: 4.14.0/CVE-2022-40768-scsi-stex-properly-zero-out-the-passthrough-command-structure.patch
- From: 4.14.296-222.539
- CVE-2019-19377, CVSSv2 Score: 7.8
- Description:
btrfs: Don't submit any btree write bio if the fs has errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.1.12/CVE-2019-19377-btrfs-Dont-submit-any-btree-write-bio-if-the-fs-has-errors.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2021-20292, CVSSv2 Score: 6.7
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
packet: in recvmsg msg_name return at least sizeof sockaddr_ll
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-least-sizeof-sockaddr_ll.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-3524, CVSSv2 Score: 5.5
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://linux.oracle.com/cve/CVE-2022-3524.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3524-tcp-udp-fix-memory-leak-in-ipv6-renew-options.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: remove unneeded variable in l2cap_stream_rx
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0001-CVE-2022-3564-Bluetooth-remove-unneeded-variable-in-l2cap_stream_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0002-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Introduce proper defines for PSM ranges
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Introduce-proper-defines-for-PSM-ran.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve/CVE-2022-42895.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in
- CVE: https://linux.oracle.com/cve/CVE-2022-3628.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls-kpatch.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-41858, CVSSv2 Score: 7.1S
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-41858-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://linux.oracle.com/cve/CVE-2023-0394.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_pus.patch
- From: 4.1.12-124.73.1
- CVE-2019-5489, CVSSv2 Score: 5.5
- Description:
mm/mincore.c: make mincore() more conservative
- CVE: https://linux.oracle.com/cve/CVE-2019-5489.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2019-5489-mm-mincore.c-make-mincore-more-conservative.patch
- From: 4.1.12-124.73.1
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://linux.oracle.com/cve/CVE-2023-1073.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1073-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.1.12-124.73.2
- CVE-2023-1095, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fix null deref due to zeroed list head
- CVE: https://linux.oracle.com/cve/CVE-2023-1095.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1095-netfilter-nf_tables-fix-null-deref-due-to-zeroed-lis.patch
- From: 4.1.12-124.73.2
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://linux.oracle.com/cve/CVE-2023-1074.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-a-gi.patch
- From: 4.1.12-124.73.2
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
- CVE: https://linux.oracle.com/cve/CVE-2020-0404.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-mal.patch
- From: 4.1.12-124.73.2
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://linux.oracle.com/cve/CVE-2023-0458.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-0458-array_index_nospec-Sanitize-speculative-array-de-references.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://linux.oracle.com/cve/CVE-2023-0458.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-0458-patch-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2248, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://linux.oracle.com/cve/CVE-2023-2248.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2248-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-1670, CVSSv2 Score: 7.8
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://linux.oracle.com/cve/CVE-2023-1670.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-1670-patch-xirc2ps-cs-fix-use-after-free-bug-in-xirc2ps-detach.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://linux.oracle.com/cve/CVE-2023-23454.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-23454-patch-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
- CVE: https://linux.oracle.com/cve/CVE-2023-28328.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-28328-patch-media-dvb-usb-az6027-fix-null-ptr-deref-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://linux.oracle.com/cve/CVE-2023-2162.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2022-3169, CVSSv2 Score: 5.5
- Description:
nvme: restrict management ioctls to admin
- CVE: https://linux.oracle.com/cve/CVE-2022-3169.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2022-3169-patch-nvme-restrict-management-ioctls-to-admin.patch
- From: 4.1.12-124.75.3.el7uek
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.1.12/x86-kvm-vmx_vcpu_run-wrapper.patch
- From: N/A